Memory protection

Results: 165



#Item
31TSR2014  TRUCKING SECURITY REQUIREMENTS © All rights reserved.  Transported Asset Protection Association

TSR2014 TRUCKING SECURITY REQUIREMENTS © All rights reserved. Transported Asset Protection Association

Add to Reading List

Source URL: www.tapaemea.com

Language: English - Date: 2014-08-05 08:30:12
32CSRuntime Defenses Scribe Notes – Ashima Atul) Runtime Instrumentation Techniques All runtime instrumentation techniques protect the integrity of the application. They can be exploited by Denial-of-Servic

CSRuntime Defenses Scribe Notes – Ashima Atul) Runtime Instrumentation Techniques All runtime instrumentation techniques protect the integrity of the application. They can be exploited by Denial-of-Servic

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:42
33Version 1.0  Communication, Interrupts and Protection David May: March 24, 2014  Communication and Input-Output

Version 1.0 Communication, Interrupts and Protection David May: March 24, 2014 Communication and Input-Output

Add to Reading List

Source URL: www.cs.bris.ac.uk

Language: English - Date: 2014-03-25 07:06:21
34BakerSFIeld: Bringing software fault isolation to x64  Drew Dean Computer Science Lab SRI International Menlo Park, CA, USA

BakerSFIeld: Bringing software fault isolation to x64 Drew Dean Computer Science Lab SRI International Menlo Park, CA, USA

Add to Reading List

Source URL: www.cs.princeton.edu

Language: English - Date: 2014-04-28 13:57:15
35Version 1.0  Communication, Interrupts and Protection David May: March 24, 2014  Communication and Input-Output

Version 1.0 Communication, Interrupts and Protection David May: March 24, 2014 Communication and Input-Output

Add to Reading List

Source URL: www.cs.bris.ac.uk

Language: English - Date: 2014-03-25 07:06:21
36Your Family Land: Legacy or Memory? An Introduction to the Family Land Protection Process, NA-IN-01-09, Nov. 2008

Your Family Land: Legacy or Memory? An Introduction to the Family Land Protection Process, NA-IN-01-09, Nov. 2008

Add to Reading List

Source URL: na.fs.fed.us

Language: English - Date: 2012-09-19 13:11:28
37Advanced Heap Manipulation in Windows 8 Zhenhua(Eric) Liu  VERSION 1.2 Contents

Advanced Heap Manipulation in Windows 8 Zhenhua(Eric) Liu VERSION 1.2 Contents

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2013-04-01 08:11:01
38The Cake is a Lie: Privilege Rings as a Policy Resource Sergey Bratus1 , Peter C. Johnson1 , Michael E. Locasto2 , Ashwin Ramaswamy1 , and Sean W. Smith1 1 2  Dartmouth College

The Cake is a Lie: Privilege Rings as a Policy Resource Sergey Bratus1 , Peter C. Johnson1 , Michael E. Locasto2 , Ashwin Ramaswamy1 , and Sean W. Smith1 1 2 Dartmouth College

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2009-09-03 12:12:14
39A Practical Dynamic Buffer Overflow Detector Olatunji Ruwase Monica S. Lam  Transmeta Corporation

A Practical Dynamic Buffer Overflow Detector Olatunji Ruwase Monica S. Lam Transmeta Corporation

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2004-11-17 13:32:32
40Computer Science  SEER: Practical Memory Virus Scanning-as-a-Service for Virtualized Environments Jason Gionta, Ahmed Azab,

Computer Science SEER: Practical Memory Virus Scanning-as-a-Service for Virtualized Environments Jason Gionta, Ahmed Azab,

Add to Reading List

Source URL: gionta.org

Language: English - Date: 2014-12-11 10:19:04